:

DELVE'S CLIENT CONTEXT AI HIT BY SECURITY BREACH

SECURITY DESK1 MIN READ
THU, APR 23, 2026

■ AI-SUMMARIZED FROM 1 SOURCE BELOW

Context AI, an AI agent training startup, disclosed a security incident last week. TechCrunch confirmed that Delve, a compliance company, had certified Context AI's security.

The breach marks another problem for Delve, a startup already facing operational troubles. Context AI's disclosure raises questions about the effectiveness of Delve's security certifications. Delve provides compliance services and security certifications for startups. The company's involvement with Context AI came to light through TechCrunch's investigation into the AI startup's incident. Context AI has not disclosed specific details about the breach's scope or the data affected. The incident highlights risks in the AI sector, where emerging companies often rely on third-party compliance firms to validate their security practices. This is not Delve's first customer to experience a major security problem. The pattern raises concerns about whether Delve's certification processes adequately identify vulnerabilities before incidents occur. Both companies have not released comprehensive statements about remediation efforts or customer notification protocols.

■ SOURCES

TechCrunch

■ SUMMARY WRITTEN BY AI FROM THE LINKS ABOVE

■ MORE FROM THE SECURITY DESK

Password resets, commonly used to regain access to accounts, are a prime vulnerability for attackers. Research from Specops Software reveals that social engineering targeting helpdesks can turn legitimate reset requests into complete account takeovers.

JUST NOWIndustry Desk

Zscaler's CEO Jay Chaudhry reports unprecedented demand for the company's services as enterprises grapple with escalating cybersecurity threats. The remarks come as large organizations face mounting challenges protecting themselves against emerging AI-related vulnerabilities.

2H AGOIndustry Desk

Sean Plankey has requested to withdraw his nomination to lead the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The withdrawal comes after the agency endured a period of unstable temporary leadership.

2H AGOSecurity Desk

Trigona ransomware operators are leveraging a custom command-line exfiltration tool to accelerate data theft from compromised networks. The tool enables faster, more efficient extraction of sensitive information.

2H AGOSecurity Desk

■ SUBSCRIBE TO THE DAILY BRIEF

ONE EMAIL, 5 STORIES, 06:00 UTC. UNSUBSCRIBE ANYTIME.